Understanding identity exposure in pervasive computing environments

被引:21
|
作者
Zhu, Feng [1 ]
Carpenter, Sandra [2 ]
Kulkarni, Ajinkya [1 ]
机构
[1] Univ Alabama, Dept Comp Sci, Huntsville, AL 35899 USA
[2] Univ Alabama, Dept Psychol, Huntsville, AL 35899 USA
关键词
Identity management; Pervasive computing; Privacy; PRIVACY; TRUST;
D O I
10.1016/j.pmcj.2011.06.007
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Various miniaturized computing devices that store our identity information are emerging rapidly and are likely to become ubiquitous in the future. They allow private information to be exposed and accessed easily via wireless networks. When identity and context information is gathered by pervasive computing devices, personal privacy might be sacrificed to a greater extent than ever before. People whose information is targeted may have different privacy protection skills, awareness, and privacy preferences. In this research, we studied the following issues and their relations: (a) identity information that people think is important to keep private; (b) actions that people claim to take to protect their identities and privacy; (c) privacy concerns; (d) how people expose their identity information in pervasive computing environments; and (e) how our RationalExposure model can help minimize unnecessary identity exposure. We conducted the research in three stages, a comprehensive survey and two in-lab experiments. We built a simulated pervasive computing shopping system, called InfoSource. It consisted of two applications and our RationalExposure model. Our data show that identity exposure decisions depended on participants' attitudes about maintaining privacy, but did not depend on participants' concerns or security actions that they claimed to have taken. Our RationalExposure model did help the participants reduce unnecessary disclosures. (C) 2011 Elsevier B.V. All rights reserved.
引用
收藏
页码:777 / 794
页数:18
相关论文
共 50 条
  • [1] A Game Theoretic Approach to Optimize Identity Exposure in Pervasive Computing Environments
    Zhu, Feng
    Carpenter, Sandra
    Zhu, Wei
    Mutka, Matt W.
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2010, 4 (04) : 1 - 20
  • [2] RationalExposure: a Game Theoretic Approach to Optimize Identity Exposure in Pervasive Computing Environments
    Zhu, Feng
    Zhu, Wei
    [J]. 2009 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS (PERCOM), VOLS 1 AND 2, 2009, : 79 - +
  • [3] VeryIDX - A Digital Identity Management System for Pervasive Computing Environments
    Paci, Federica
    Bertino, Elisa
    Kerr, Sam
    Lint, Aaron
    Squicciarini, Anna
    Woo, Jungha
    [J]. SOFTWARE TECHNOLOGIES FOR EMBEDDED AND UBIQUITOUS SYSTEMS, PROCEEDINGS, 2008, 5287 : 268 - +
  • [4] Understanding and avoiding interaction-based instability in pervasive computing environments
    Zamudio, Victor
    Callaghan, Victor
    [J]. INTERNATIONAL JOURNAL OF PERVASIVE COMPUTING AND COMMUNICATIONS, 2009, 5 (02) : 163 - +
  • [5] Expose or not? A progressive exposure approach for service discovery in pervasive computing environments
    Zhu, F
    Zhu, W
    Mutka, MW
    Ni, L
    [J]. THIRD IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2005, : 225 - 234
  • [6] Coordination in pervasive computing environments
    Ferscha, A
    [J]. TWELFTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2003, : 3 - 9
  • [7] On Modeling for Pervasive Computing Environments
    Campiolo, Rodrigo
    Cremer, Vivian
    Sobral, Joao Bosco M.
    [J]. MSWIM'07: PROCEEDINGS OF THE TENTH ACM SYMPOSIUM ON MODELING, ANALYSIS, AND SIMULATION OF WIRELESS AND MOBILE SYSTEMS, 2007, : 240 - 243
  • [8] Identity-Based Inter-domain Authentication Scheme in Pervasive Computing Environments
    Huo, Shi-Wei
    Luo, Chang-Yuan
    Xin, Hong-Zhi
    [J]. INTELLIGENT COMPUTING AND INFORMATION SCIENCE, PT II, 2011, 135 : 314 - 320
  • [9] Protection of privacy in pervasive computing environments
    Cheng, HS
    Zhang, DQ
    Tan, JG
    [J]. ITCC 2005: International Conference on Information Technology: Coding and Computing, Vol 2, 2005, : 242 - 247
  • [10] Pervasive Computing in Classroom Environments and Applications
    Oluwagbemi, Folakemi
    Misra, Sanjay
    Omoregbe, Nicholas
    [J]. 2014 GLOBAL SUMMIT ON COMPUTER & INFORMATION TECHNOLOGY (GSCIT), 2014,